Author : Bader, Lect.Nada
Basra studies journal,
Volume 18, Issue 1994, Pages 1-29
The rapid developments in information technology applications helped the growing institutional capacity in the field of digitization, as it opened the way for the adoption of programs and applications e-governance, which aims to improve institutional performance in the public and private sectors, and a desire Iraqi governmental institutions to benefit from the application of information technology in facilitating ways transactions and simplify administrative procedures completed transactions of citizens, has pursued this strategy institutions develop e-governance applications. The building gates of e-governance in Iraq will have a positive impact on the organization of administrative work, and build bridges of communication between the community and the government as well as the importance of this step in the development of the community of the importance of concepts of IT applications and the extent of their contribution to the simplification of procedures for administrative and banking transactions. So it is important to be fruitful application experiences and give a positive effect contributes to change the traditional pattern prevailing in the completion of administrative transactions. Perhaps one of the most important positives of e-governance, lies in its ability to provide a high level of transparency and reduce administrative corruption phenomenon resulting originally from direct contact between the citizen and the officer responsible for the completion of transactions.
The research governance principles electronic and importance and highlights the governance systems and mechanisms applied to companies, and highlight the importance of the application of the concept of governance for companies operating in the economic environment in the province of Basra, the capital of Iraq's economic, and design an electronic portal for corporate governance operating in the province and protect the site of this portal using file htaccess. And building and security measures to prevent attacks on the site as well as early detection of penetrating the network using honeypots.